Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
cygnet [2015/11/13 11:29] – Confirm date and add details 127.0.0.1cygnet [2022/05/08 11:42] (current) – external edit 127.0.0.1
Line 1: Line 1:
-Cygnet Crypto Party+====== Cygnet Crypto Party ======
  
 Everyone is invited to attend a Crypto Party! Everyone is invited to attend a Crypto Party!
  
-## Privacy matters+===== Privacy matters =====
  
 Quote from the official **Crypto Party Handbook** Quote from the official **Crypto Party Handbook**
Line 9: Line 9:
 "Privacy is a fundamental human right. It is recognised in many countries to be as central to individual human dignity and social values as Freedom of Association and Freedom of Speech. Simply put, privacy is the border where we draw a line between how far a society can intrude into our personal lives." "Privacy is a fundamental human right. It is recognised in many countries to be as central to individual human dignity and social values as Freedom of Association and Freedom of Speech. Simply put, privacy is the border where we draw a line between how far a society can intrude into our personal lives."
  
-##When & Where +===== When & Where =====
-2 to 5pm **Sunday 20th December 2015** +
-**Cygnet Town Hall** upstairs in the Supper Room (Open Streetmap link)+
  
-## What is it? +2pm to 5pm **Sunday 20th December 2015** **Cygnet Town Hall** upstairs in the Supper Room [[https://www.openstreetmap.org/#map=18/-43.16177/147.07613|Open Streetmap]]
-[Party like it is 1984](https://www.cryptoparty.in"CryptoParty")+
  
-+ A Crypto Party is a chance for people to learn about the digital landscape in relation to privacy and security+===== What is it? =====
  
-+ If you want there will be people who will help you install and become familiar with privacy tools and techniques+[[https://www.cryptoparty.in/|Party like it is 1984]]
  
-## Reasons why?+  * A Crypto Party is a chance for people to learn about the digital landscape in relation to privacy and security 
 +  * If you want there will be people who will help you install and become familiar with privacy tools and techniques
  
-+ I have nothing to hide! +===== Reasons why? =====
-> But I have a bad feeling about my privacy and security+
  
-## What's your level of interest?+  * I have nothing to hide! 
 +    * But I have a bad feeling about my privacy and security 
 + 
 +===== What's your level of interest? =====
  
 In anticipation that their will be different levels of knowledge and interest there will be two sections In anticipation that their will be different levels of knowledge and interest there will be two sections
  
-### Hungry for information+==== Hungry for information ====
  
- group for people who want background information+  * A group for people who want background information 
 +    * Brief background talk 
 +    * Videos to watch 
 +    * Videos, documentation & software to download from local server onto USB drives if those attending wish to learn or experiment at a later date 
 +    * Lots of discussion (Questions & Answers, sharing stories)
  
- > Brief background talk+==== Ready for action? ====
  
- > Videos to watch+  * A group for those wanting to set up their devices for better privacy 
 +    * There will be a local server with authenticated software packages for you to install onto your devices with guided assistance if required. 
 +    * Bring your phone, laptop and a USB disk (don't forget your power supply) 
 +    * Detailed information on tools and links below
  
- > Videos, documentation software to download from local server onto USB drives if those attending wish to learn or experiment at a later date+===== Tools techniques =====
  
- > Lots of discussion (Questions & Answers, sharing stories)+//topic summary//:
  
-### Ready for action?+  * Privacy & Identity authorisation (OpenPGP), Virus & mal-ware, Password management, Tracking & Meta-data, Anonymity & pseudo-anonymity, Security: not as a //panacea// but a //process// recognising that compromises or trade-offs prevent total security, Dark Web, Deep Web, Crypto Currencies
  
-+ A group for those wanting to set up their devices for better privacy+===== Topics details =====
  
- > There will be a local server with authenticated software packages for you to install onto your devices with guided assistance if required.+==== Passwords ====
  
- > Bring your phone, laptop and a USB disk (don't forget your power supply) +  * Recommend passphrases 
-  +    * Pasword managment and further recommendations
- > Detailed information on tools and links below+
  
-## Tools & techniques+==== Cryptography ====
  
-*topic summary*:+  Basic Concept //summary// 
 +    Public key cryptography = public Key (encrypts) & private key (decrypts) versus conventiaonal secret-key = one key is used both for encryption and decryption = Asymmetric versus Symmetric 
 +    * Public Key Infrastructure (PKI) = security, authentication, confidentiality, integrity, non-repudiation and access control +Certification Authorities = Cryptographic certificatestrust is built into your browser 
 +    * Encryption and Decryption = information is obfuscated by encryption. Can be a message, a file, a disk (storage medium) or //anything// that can be codified 
 +    * Common software tools are PGP (Pretty Good Privacy) & the open source GnuPG (or GPG = Gnu Privacy Guard) is a complete and free implementation of OpenPGP 
 +    * Secure Sockets Layer (SSL) https 
 +    * GnuPG or OpenPGP signatures - use a private key to sign a file. Anyone who has the corresponding public key can check whether the file was signed by the private key. Anyone who doesn’t have the private key cannot forge such a signature 
 +  * Verifying a file 
 +    * [[http://en.wikipedia.org/wiki/Cryptographic_hash_function|File checksum]] 
 +  * Wireless security 
 +    * WAR driving risks 
 +    * Mac address spoofing 
 +  * [[https://canarywatch.org/faq.html|Canary watch]] 
 +    * Method by which a communications service provider informs its users that the provider has not been served with a secret United States government subpoena 
 +  * Government surveillance +PRISM 
 +  * Big data 
 +    * Corporate risks 
 +    * Pay wave 
 +  * International Crime Syndicates +Lack of data security - Target, Sony Madison etc 
 +    * [[https://www.torproject.org/docs/faq.html.en|Tor]] 
 +    * Born out of the [[http://www.onion-router.net/|onion routing project]] run by the Naval Research Lab 
 +  * VPN'
 +    * Virtual Private Networks - encrypted communications via IP tunnels 
 +  * Dark Web 
 +    * Accessed via Tor using directories or shared links from trusted collegues rather than search engines 
 +  * Deep web 
 +    * The large protion of the Internet behind firewalls or part of a secure Wide Area restricted network 
 +    * Requires login & generally accessed via a VPN (Virtual Private network) 
 +  * Crypto currency 
 +    * Bitcoin and the block chain 
 +    * Distributed public ledger
  
-> Privacy & Identity authorisation (OpenPGP), Virus & mal-ware, Password management, Tracking & Meta-data, Anonymity & pseudo-anonymity, Security: not as a *panacea* but a *process* recognising that compromises or trade-offs prevent total security, Dark Web, Deep Web, Crypto Currencies+===== Live Distibutions =====
  
-## Topics details+List of known certification allowing booting from Secure Boot (UEFI = Unified Extensible Firmware Interface) BIOS
  
-### Passwords+  * Ubuntu and it's derivitaves (Mint) 
 +  * Debian 
 +  * Arch
  
-+ Recommend passphrases+===== Demonstrations =====
  
-+ Pasword managment and further recommendations+  * [[http://map.norsecorp.com/v1/|Hacking live map & table]] 
 +  * [[https://addons.mozilla.org/en-US/firefox/addon/lightbeam/|Lightbeam plugin]] 
 +  * [[https://panopticlick.eff.org/|Browser fingerprint]] 
 +  * [[https://www.howsmyssl.com/|How's My SSL?]]
  
-### Cryptography+===== Tools & resource links =====
  
-+ Basic Concept *summary+**Do your part to resist Government surveillance and take back your privacy:*
- >Public key cryptography public Key (encrypts& private key (decryptsversus conventiaonal secret-key = one key is used both for encryption and decryption = Asymmetric versus Symmetric+==== Computer Software ==== 
 +  * Browser Privacy: [[https://www.eff.org/https-everywhere|HTTPS Everywhere]], [[https://addons.mozilla.org/en-US/firefox/addon/ublock/|UBlock]] or [[https://github.com/gorhill/uBlock|gorhill/uBlock · GitHub]] + [[https://www.disconnect.me/|Disconnect]], [[http://noscript.net/|NoScript]] (FireFox), [[https://chrome.google.com/webstore/detail/notscripts/odjhifogjcknibkahlpidmdajjpkkcfn?hl=en|NotScript]] (Chrome) 
 +  * VPNs: [[https://help.riseup.net/en/vpn|Risup.net]][[https://www.privateinternetaccess.com/|Private Internet Access]] (US), [[http://btguard.com/|BTGuard]] (Canada), [[http://www.itshidden.eu/|ItsHidden]] (Africa), [[https://ipredator.se/|Ipredator]] (Sweden), [[http://faceless.me/|Faceless.me]] (Cyprus / Netherlands) 
 +  * Internet Anonymity: [[https://www.torproject.org/|Tor]], [[https://www.torproject.org/projects/torbrowser.html.en|Tor Browser Bundle]], [[http://i2p2.de/|I2P]] 
 +  * Disk Encryption: [[http://www.truecrypt.org/|TrueCrypt]] (Windows / OSX / Linux), [[http://support.apple.com/kb/ht4790|File Vault]] (Mac). 
 +  * File/Email Encryption: [[https://www.gpgtools.org/|GPGTools]] + [[https://www.gpgtools.org/gpgmail/index.html|GPGMail]] (Mac), [[http://www.gpg4win.org/|GPG4Win]] (Windows), [[http://www.enigmail.net/home/index.php|Enigmail]] (Windows / OSX / Linux) * Instant Messaging (IM) Encryption: [[http://www.pidgin.im/|Pidgin]] + [[http://www.cypherpunks.ca/otr/|Pidgin OTR]] 
 +  * IM/Voice Encryption: [[http://mumble.sourceforge.net/|Mumble]], [[https://jitsi.org/|Jitsi]] 
 +  * Phone/SMS Encryption: [[http://www.whispersystems.org/|WhisperSystems]], [[https://guardianproject.info/apps/ostel/|Ostel]], [[https://myceli.al/projects/spore-android-client|Spore]], [[http://threema.ch/en/|Threema]], [[https://silentcircle.com/|Silent Circle]] ($$$) 
 +  * Google Alternative: [[https://duckduckgo.com/|DuckDuckGo]], [[https://startpage.com/|StartPage]] 
 +  * Digital P2P Currency: [[http://bitcoin.org/|BitCoin]] 
 +  * Live Anonymous/Secure Linux: [[https://tails.boum.org/|TAILS Linux]]
  
- >Public Key Infrastructure (PKI) security, authentication, confidentiality, integrity, non-repudiation and access control+==== Android Smart Phone ====
  
- >Certification Authorities = Cryptographic certificatestrust is built into your browser+  * [[https://f-droid.org/|F-Droid]]
  
- >Encryption and Decryption information is obfuscated by encryption. Can be a message, a file, a disk (storage medium) or *anything* that can be codified+==== Resourses & Information ====
  
- >Common software tools are PGP (Pretty Good Privacy) & the open source GnuPG (or GPG = Gnu Privacy Guard) is a complete and free implementation of OpenPGP+  * General: [[https://ssd.eff.org/|EFF's Surveillance Self-Defense Project]], [[https://myshadow.org/|Me and my Shadow]], [[https://www.privacytools.io/|privacy tools Privacy.io]], [[https://www.tacticaltech.org/|Tactical Technology Collective]], [[https://www.frontlinedefenders.org/|Front Line Defenders]], [[https://nofakeinternet.org/|No Fake Internet]] 
 +  * For Journalists:[[http://www.tcij.org/|Information Security for Journalists- Centre for Investigative Journalism]].[[https://www.schneier.com/blog/archives/2015/11/the_rise_of_pol.html|The Rise of Political Doxing - Schneier on Security]][[https://witness.org/|WITNESS | Human Rights Video]] 
 +  * Coders:[[https://vimeo.com/131115865|NDC Conference Keynotespeaker Bruce Schneier]] 
 +  * Passwords: [[http://xkcd.com/936/|xkcd: Password Strength]] 
 +  * [[https://en.wikipedia.org/wiki/Nineteen_Eighty-Four|Nineteen Eighty-Four]] 
 +  * Activists: [[https://www.frontlinedefenders.org|Digital Security and Privacy for Human Rights Defenders]]
  
- >Secure Sockets Layer (SSL) https+===== Quotes =====
  
- >GnuPG or OpenPGP signatures - use a private key to sign a file. Anyone who has the corresponding public key can check whether the file was signed by the private key. Anyone who doesn’t have the private key cannot forge such a signature +"You're making some herd immunity for the people who really do need it, for the people doing that work, because their traffic blends in with yours." [[http://www.zdnet.com/article/lessons-from-a-sydney-cryptoparty/#!|Tom Sulston]]
- +
-+ Verifying a file +
->[File checksum](http://en.wikipedia.org/wiki/Cryptographic_hash_function) +
- +
-+ Wireless security +
- > WAR driving risks +
- +
- >Mac address spoofing +
- +
-+ [Canary watch](https://canarywatch.org/faq.html "Canary Watch - FAQ"+
-> Method by which a communications service provider informs its users that the provider has not been served with a secret United States government subpoena +
- +
-+ Government surveillance +
->PRISM +
- +
-+ Big data +
- >Corporate risks +
- +
- >Pay wave +
- +
-+ International Crime Syndicates +
- >Lack of data security - Target, Sony Madison etc +
-+ [Tor](https://www.torproject.org/docs/faq.html.en "Tor FAQs"+
-> Born out of the [onion routing project](http://www.onion-router.net/) run by the Naval Research Lab +
- +
-+ VPN'+
- >Virtual Private Networks - encrypted communications via IP tunnels +
- +
-+ Dark Web +
- > Accessed via Tor using directories or shared links from trusted collegues rather than search engines +
- +
-+ Deep web +
- > The large protion of the Internet behind firewalls or part of a secure Wide Area restricted network +
- +
- > Requires login & generally accessed via a VPN (Virtual Private network) +
- +
-+ Crypto currency +
- > Bitcoin and the block chain +
- +
- > Distributed public ledger +
- +
-## Live Distros +
- +
-Only listing these because they are known to have certification for modern Secure Boot (UEFI = Unified Extensible Firmware Interface) BIOS +
- +
-+ Ubuntu and it's derivitaves (Mint) +
- +
-+ Debian +
- +
-* Arch +
- +
-## Demonstrations +
- +
->[Hacking live map & table](http://map.norsecorp.com/v1/+
- +
->[Lightbeam plugin](https://addons.mozilla.org/en-US/firefox/addon/lightbeam/+
- +
->[Browser fingerprint](https://panopticlick.eff.org/ "panopticlick"+
- +
->[How's My SSL?](https://www.howsmyssl.com/+
- +
-## Tools & resource links +
- +
-**Do your part to resist Government surveillance and take back your privacy:** +
-### Computer Software +
-* Browser Privacy: [HTTPS Everywhere](https://www.eff.org/https-everywhere), [UBlock](https://addons.mozilla.org/en-US/firefox/addon/ublock/) or [gorhill/uBlock · GitHub](https://github.com/gorhill/uBlock) + [Disconnect](https://www.disconnect.me/), [NoScript](http://noscript.net/) (FireFox), [NotScript](https://chrome.google.com/webstore/detail/notscripts/odjhifogjcknibkahlpidmdajjpkkcfn?hl=en) (Chrome) +
-* VPNs: [Risup.net](https://help.riseup.net/en/vpn)[Private Internet Access](https://www.privateinternetaccess.com/) (US), [BTGuard](http://btguard.com/) (Canada), [ItsHidden](http://www.itshidden.eu/) (Africa), [Ipredator](https://ipredator.se/) (Sweden), [Faceless.me](http://faceless.me/) (Cyprus / Netherlands) +
-* Internet Anonymity: [Tor](https://www.torproject.org/), [Tor Browser Bundle](https://www.torproject.org/projects/torbrowser.html.en), [I2P](http://i2p2.de/+
-* Disk Encryption: [TrueCrypt](http://www.truecrypt.org/) (Windows / OSX / Linux), [File Vault](http://support.apple.com/kb/ht4790) (Mac). +
-* File/Email Encryption: [GPGTools](https://www.gpgtools.org/) + [GPGMail](https://www.gpgtools.org/gpgmail/index.html) (Mac), [GPG4Win](http://www.gpg4win.org/) (Windows), [Enigmail](http://www.enigmail.net/home/index.php) (Windows / OSX / Linux) +
-* Instant Messaging (IM) Encryption: [Pidgin](http://www.pidgin.im/) + [Pidgin OTR](http://www.cypherpunks.ca/otr/+
-* IM/Voice Encryption: [Mumble](http://mumble.sourceforge.net/), [Jitsi](https://jitsi.org/+
-* Phone/SMS Encryption: [WhisperSystems](http://www.whispersystems.org/), [Ostel](https://guardianproject.info/apps/ostel/), [Spore](https://myceli.al/projects/spore-android-client), [Threema](http://threema.ch/en/), [Silent Circle](https://silentcircle.com/) ($$$) +
-* Google Alternative: [DuckDuckGo](https://duckduckgo.com/), [StartPage](https://startpage.com/+
-* Digital P2P Currency: [BitCoin](http://bitcoin.org/+
-* Live Anonymous/Secure Linux: [TAILS Linux](https://tails.boum.org/+
- +
-### Android Smart Phone +
-+ [F-Droid](https://f-droid.org/+
- +
-### Resourses & Information +
-+ General: [EFF's Surveillance Self-Defense Project](https://ssd.eff.org/), [Me and my Shadow](https://myshadow.org/), [privacy tools - Privacy.io](https://www.privacytools.io/), [Tactical Technology Collective](https://www.tacticaltech.org/), [Front Line Defenders](https://www.frontlinedefenders.org/), [No Fake Internet](https://nofakeinternet.org/+
-+ For Journalists:[Information Security for Journalists- Centre for Investigative Journalism](http://www.tcij.org/).[The Rise of Political Doxing - Schneier on Security](https://www.schneier.com/blog/archives/2015/11/the_rise_of_pol.html)[WITNESS | Human Rights Video](https://witness.org/+
-+ Coders:[Keynote: Bruce Schneier on Vimeo](https://vimeo.com/131115865) +
-+ Passwords: [xkcd: Password Strength](http://xkcd.com/936/+
-+ [Nineteen Eighty-Four](https://en.wikipedia.org/wiki/Nineteen_Eighty-Four) +
-+ Activists: [Workbook on security: practical steps for human rights defenders at risk](www.frontlinedefenders.org) +
-##Quotes +
- +
-"You're making some herd immunity for the people who really do need it, for the people doing that work, because their traffic blends in with yours." [Tom Sulston](http://www.zdnet.com/article/lessons-from-a-sydney-cryptoparty/#"Lessons from a Sydney cryptoparty")+
  
 "Security is complicated, it's more about operational security." "Security is complicated, it's more about operational security."
- 
  
 "Surveillance and freedom are compatible = not" "Surveillance and freedom are compatible = not"
Line 189: Line 154:
 "Data is the pollution of the information age" "Data is the pollution of the information age"
  
 +====== Cygnet CryptoParty Poster ======
 +
 +{{:cygnet:ccp.pdf|Cygnet CryptoParty Poster}}
 +
 +{{:cygnet:ccp-flyer.pdf|Cygnet CryptoParty Flyer}}